1package eu.siacs.conversations.ui;
2
3import android.content.Intent;
4import android.databinding.DataBindingUtil;
5import android.os.Bundle;
6import android.support.v7.app.ActionBar;
7import android.util.Log;
8import android.view.Gravity;
9import android.view.Menu;
10import android.view.MenuItem;
11import android.view.View;
12import android.view.View.OnClickListener;
13import android.widget.Button;
14import android.widget.CompoundButton;
15import android.widget.LinearLayout;
16import android.widget.TextView;
17import android.widget.Toast;
18
19import org.whispersystems.libsignal.IdentityKey;
20
21import java.util.ArrayList;
22import java.util.Arrays;
23import java.util.HashMap;
24import java.util.List;
25import java.util.Map;
26import java.util.Set;
27import java.util.concurrent.atomic.AtomicBoolean;
28
29import eu.siacs.conversations.Config;
30import eu.siacs.conversations.R;
31import eu.siacs.conversations.crypto.axolotl.AxolotlService;
32import eu.siacs.conversations.crypto.axolotl.FingerprintStatus;
33import eu.siacs.conversations.databinding.ActivityTrustKeysBinding;
34import eu.siacs.conversations.databinding.KeysCardBinding;
35import eu.siacs.conversations.entities.Account;
36import eu.siacs.conversations.entities.Conversation;
37import eu.siacs.conversations.utils.CryptoHelper;
38import eu.siacs.conversations.utils.XmppUri;
39import eu.siacs.conversations.xmpp.OnKeyStatusUpdated;
40import eu.siacs.conversations.xmpp.jid.InvalidJidException;
41import eu.siacs.conversations.xmpp.jid.Jid;
42
43
44public class TrustKeysActivity extends OmemoActivity implements OnKeyStatusUpdated {
45 private List<Jid> contactJids;
46
47 private Account mAccount;
48 private Conversation mConversation;
49
50 private AtomicBoolean mUseCameraHintShown = new AtomicBoolean(false);
51
52 private AxolotlService.FetchStatus lastFetchReport = AxolotlService.FetchStatus.SUCCESS;
53
54 private final Map<String, Boolean> ownKeysToTrust = new HashMap<>();
55 private final Map<Jid,Map<String, Boolean>> foreignKeysToTrust = new HashMap<>();
56
57 private final OnClickListener mSaveButtonListener = new OnClickListener() {
58 @Override
59 public void onClick(View v) {
60 commitTrusts();
61 finishOk();
62 }
63 };
64
65 private final OnClickListener mCancelButtonListener = new OnClickListener() {
66 @Override
67 public void onClick(View v) {
68 setResult(RESULT_CANCELED);
69 finish();
70 }
71 };
72 private Toast mUseCameraHintToast = null;
73 private ActivityTrustKeysBinding binding;
74
75 @Override
76 protected void refreshUiReal() {
77 invalidateOptionsMenu();
78 populateView();
79 }
80
81 @Override
82 protected void onCreate(final Bundle savedInstanceState) {
83 super.onCreate(savedInstanceState);
84 this.binding = DataBindingUtil.setContentView(this,R.layout.activity_trust_keys);
85 this.contactJids = new ArrayList<>();
86 for(String jid : getIntent().getStringArrayExtra("contacts")) {
87 try {
88 this.contactJids.add(Jid.fromString(jid));
89 } catch (InvalidJidException e) {
90 e.printStackTrace();
91 }
92 }
93
94 binding.cancelButton.setOnClickListener(mCancelButtonListener);
95 binding.saveButton.setOnClickListener(mSaveButtonListener);
96
97
98 if (getSupportActionBar() != null) {
99 getSupportActionBar().setHomeButtonEnabled(true);
100 getSupportActionBar().setDisplayHomeAsUpEnabled(true);
101 }
102
103 if (savedInstanceState != null) {
104 mUseCameraHintShown.set(savedInstanceState.getBoolean("camera_hint_shown",false));
105 }
106 }
107
108 @Override
109 public void onSaveInstanceState(Bundle savedInstanceState) {
110 savedInstanceState.putBoolean("camera_hint_shown", mUseCameraHintShown.get());
111 super.onSaveInstanceState(savedInstanceState);
112 }
113
114 @Override
115 public boolean onCreateOptionsMenu(Menu menu) {
116 getMenuInflater().inflate(R.menu.trust_keys, menu);
117 MenuItem scanQrCode = menu.findItem(R.id.action_scan_qr_code);
118 scanQrCode.setVisible(ownKeysToTrust.size() > 0 || foreignActuallyHasKeys());
119 return super.onCreateOptionsMenu(menu);
120 }
121
122 private void showCameraToast() {
123 mUseCameraHintToast = Toast.makeText(this,R.string.use_camera_icon_to_scan_barcode,Toast.LENGTH_LONG);
124 ActionBar actionBar = getSupportActionBar();
125 mUseCameraHintToast.setGravity(Gravity.TOP | Gravity.END, 0 ,actionBar == null ? 0 : actionBar.getHeight());
126 mUseCameraHintToast.show();
127 }
128
129 @Override
130 public boolean onOptionsItemSelected(MenuItem item) {
131 switch (item.getItemId()) {
132 case R.id.action_scan_qr_code:
133 if (hasPendingKeyFetches()) {
134 Toast.makeText(this, R.string.please_wait_for_keys_to_be_fetched, Toast.LENGTH_SHORT).show();
135 } else {
136 ScanActivity.scan(this);
137 //new IntentIntegrator(this).initiateScan(Arrays.asList("AZTEC","QR_CODE"));
138 return true;
139 }
140 }
141 return super.onOptionsItemSelected(item);
142 }
143
144 @Override
145 protected void onStop() {
146 super.onStop();
147 if (mUseCameraHintToast != null) {
148 mUseCameraHintToast.cancel();
149 }
150 }
151
152 @Override
153 protected void processFingerprintVerification(XmppUri uri) {
154 if (mConversation != null
155 && mAccount != null
156 && uri.hasFingerprints()
157 && mAccount.getAxolotlService().getCryptoTargets(mConversation).contains(uri.getJid())) {
158 boolean performedVerification = xmppConnectionService.verifyFingerprints(mAccount.getRoster().getContact(uri.getJid()),uri.getFingerprints());
159 boolean keys = reloadFingerprints();
160 if (performedVerification && !keys && !hasNoOtherTrustedKeys() && !hasPendingKeyFetches()) {
161 Toast.makeText(this,R.string.all_omemo_keys_have_been_verified, Toast.LENGTH_SHORT).show();
162 finishOk();
163 return;
164 } else if (performedVerification) {
165 Toast.makeText(this,R.string.verified_fingerprints,Toast.LENGTH_SHORT).show();
166 }
167 } else {
168 reloadFingerprints();
169 Log.d(Config.LOGTAG,"xmpp uri was: "+uri.getJid()+" has Fingerprints: "+Boolean.toString(uri.hasFingerprints()));
170 Toast.makeText(this,R.string.barcode_does_not_contain_fingerprints_for_this_conversation,Toast.LENGTH_SHORT).show();
171 }
172 populateView();
173 }
174
175 private void populateView() {
176 setTitle(getString(R.string.trust_omemo_fingerprints));
177 binding.ownKeysDetails.removeAllViews();
178 binding.foreignKeys.removeAllViews();
179 boolean hasOwnKeys = false;
180 boolean hasForeignKeys = false;
181 for(final String fingerprint : ownKeysToTrust.keySet()) {
182 hasOwnKeys = true;
183 addFingerprintRowWithListeners(binding.ownKeysDetails, mAccount, fingerprint, false,
184 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)), false, false,
185 new CompoundButton.OnCheckedChangeListener() {
186 @Override
187 public void onCheckedChanged(CompoundButton buttonView, boolean isChecked) {
188 ownKeysToTrust.put(fingerprint, isChecked);
189 // own fingerprints have no impact on locked status.
190 }
191 }
192 );
193 }
194
195 synchronized (this.foreignKeysToTrust) {
196 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
197 hasForeignKeys = true;
198 KeysCardBinding keysCardBinding = DataBindingUtil.inflate(getLayoutInflater(),R.layout.keys_card, binding.foreignKeys,false);
199 //final LinearLayout layout = (LinearLayout) getLayoutInflater().inflate(R.layout.keys_card, foreignKeys, false);
200 final Jid jid = entry.getKey();
201 keysCardBinding.foreignKeysTitle.setText(jid.toString());
202 keysCardBinding.foreignKeysTitle.setOnClickListener(v -> switchToContactDetails(mAccount.getRoster().getContact(jid)));
203 final Map<String, Boolean> fingerprints = entry.getValue();
204 for (final String fingerprint : fingerprints.keySet()) {
205 addFingerprintRowWithListeners(keysCardBinding.foreignKeysDetails, mAccount, fingerprint, false,
206 FingerprintStatus.createActive(fingerprints.get(fingerprint)), false, false,
207 (buttonView, isChecked) -> {
208 fingerprints.put(fingerprint, isChecked);
209 lockOrUnlockAsNeeded();
210 }
211 );
212 }
213 if (fingerprints.size() == 0) {
214 keysCardBinding.noKeysToAccept.setVisibility(View.VISIBLE);
215 if (hasNoOtherTrustedKeys(jid)) {
216 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
217 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_presence);
218 } else {
219 keysCardBinding.noKeysToAccept.setText(R.string.error_no_keys_to_trust_server_error);
220 }
221 } else {
222 keysCardBinding.noKeysToAccept.setText(getString(R.string.no_keys_just_confirm, mAccount.getRoster().getContact(jid).getDisplayName()));
223 }
224 } else {
225 keysCardBinding.noKeysToAccept.setVisibility(View.GONE);
226 }
227 binding.foreignKeys.addView(keysCardBinding.foreignKeysCard);
228 }
229 }
230
231 if ((hasOwnKeys || foreignActuallyHasKeys()) && mUseCameraHintShown.compareAndSet(false,true)) {
232 showCameraToast();
233 }
234
235 binding.ownKeysTitle.setText(mAccount.getJid().toBareJid().toString());
236 binding.ownKeysCard.setVisibility(hasOwnKeys ? View.VISIBLE : View.GONE);
237 binding.foreignKeys.setVisibility(hasForeignKeys ? View.VISIBLE : View.GONE);
238 if(hasPendingKeyFetches()) {
239 setFetching();
240 lock();
241 } else {
242 if (!hasForeignKeys && hasNoOtherTrustedKeys()) {
243 binding.keyErrorMessageCard.setVisibility(View.VISIBLE);
244 if (lastFetchReport == AxolotlService.FetchStatus.ERROR
245 || mAccount.getAxolotlService().fetchMapHasErrors(contactJids)) {
246 if (anyWithoutMutualPresenceSubscription(contactJids)) {
247 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_presence);
248 } else {
249 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust_server_error);
250 }
251 } else {
252 binding.keyErrorMessage.setText(R.string.error_no_keys_to_trust);
253 }
254 binding.ownKeysDetails.removeAllViews();
255 binding.ownKeysCard.setVisibility(View.GONE);
256 binding.foreignKeys.removeAllViews();
257 binding.foreignKeys.setVisibility(View.GONE);
258 }
259 lockOrUnlockAsNeeded();
260 setDone();
261 }
262 }
263
264 private boolean anyWithoutMutualPresenceSubscription(List<Jid> contactJids){
265 for(Jid jid : contactJids) {
266 if (!mAccount.getRoster().getContact(jid).mutualPresenceSubscription()) {
267 return true;
268 }
269 }
270 return false;
271 }
272
273 private boolean foreignActuallyHasKeys() {
274 synchronized (this.foreignKeysToTrust) {
275 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
276 if (entry.getValue().size() > 0) {
277 return true;
278 }
279 }
280 }
281 return false;
282 }
283
284 private boolean reloadFingerprints() {
285 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
286 ownKeysToTrust.clear();
287 AxolotlService service = this.mAccount.getAxolotlService();
288 Set<IdentityKey> ownKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided());
289 for(final IdentityKey identityKey : ownKeysSet) {
290 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
291 if(!ownKeysToTrust.containsKey(fingerprint)) {
292 ownKeysToTrust.put(fingerprint, false);
293 }
294 }
295 synchronized (this.foreignKeysToTrust) {
296 foreignKeysToTrust.clear();
297 for (Jid jid : contactJids) {
298 Set<IdentityKey> foreignKeysSet = service.getKeysWithTrust(FingerprintStatus.createActiveUndecided(), jid);
299 if (hasNoOtherTrustedKeys(jid) && ownKeysSet.size() == 0) {
300 foreignKeysSet.addAll(service.getKeysWithTrust(FingerprintStatus.createActive(false), jid));
301 }
302 Map<String, Boolean> foreignFingerprints = new HashMap<>();
303 for (final IdentityKey identityKey : foreignKeysSet) {
304 final String fingerprint = CryptoHelper.bytesToHex(identityKey.getPublicKey().serialize());
305 if (!foreignFingerprints.containsKey(fingerprint)) {
306 foreignFingerprints.put(fingerprint, false);
307 }
308 }
309 if (foreignFingerprints.size() > 0 || !acceptedTargets.contains(jid)) {
310 foreignKeysToTrust.put(jid, foreignFingerprints);
311 }
312 }
313 }
314 return ownKeysSet.size() + foreignKeysToTrust.size() > 0;
315 }
316
317 public void onBackendConnected() {
318 Intent intent = getIntent();
319 this.mAccount = extractAccount(intent);
320 if (this.mAccount != null && intent != null) {
321 String uuid = intent.getStringExtra("conversation");
322 this.mConversation = xmppConnectionService.findConversationByUuid(uuid);
323 if (this.mPendingFingerprintVerificationUri != null) {
324 processFingerprintVerification(this.mPendingFingerprintVerificationUri);
325 this.mPendingFingerprintVerificationUri = null;
326 } else {
327 reloadFingerprints();
328 populateView();
329 invalidateOptionsMenu();
330 }
331 }
332 }
333
334 private boolean hasNoOtherTrustedKeys() {
335 return mAccount == null || mAccount.getAxolotlService().anyTargetHasNoTrustedKeys(contactJids);
336 }
337
338 private boolean hasNoOtherTrustedKeys(Jid contact) {
339 return mAccount == null || mAccount.getAxolotlService().getNumTrustedKeys(contact) == 0;
340 }
341
342 private boolean hasPendingKeyFetches() {
343 return mAccount != null && mAccount.getAxolotlService().hasPendingKeyFetches(mAccount, contactJids);
344 }
345
346
347 @Override
348 public void onKeyStatusUpdated(final AxolotlService.FetchStatus report) {
349 final boolean keysToTrust = reloadFingerprints();
350 if (report != null) {
351 lastFetchReport = report;
352 runOnUiThread(new Runnable() {
353 @Override
354 public void run() {
355 if (mUseCameraHintToast != null && !keysToTrust) {
356 mUseCameraHintToast.cancel();
357 }
358 switch (report) {
359 case ERROR:
360 Toast.makeText(TrustKeysActivity.this,R.string.error_fetching_omemo_key,Toast.LENGTH_SHORT).show();
361 break;
362 case SUCCESS_TRUSTED:
363 Toast.makeText(TrustKeysActivity.this,R.string.blindly_trusted_omemo_keys,Toast.LENGTH_LONG).show();
364 break;
365 case SUCCESS_VERIFIED:
366 Toast.makeText(TrustKeysActivity.this,
367 Config.X509_VERIFICATION ? R.string.verified_omemo_key_with_certificate : R.string.all_omemo_keys_have_been_verified,
368 Toast.LENGTH_LONG).show();
369 break;
370 }
371 }
372 });
373
374 }
375 if (keysToTrust || hasPendingKeyFetches() || hasNoOtherTrustedKeys()) {
376 refreshUi();
377 } else {
378 runOnUiThread(new Runnable() {
379 @Override
380 public void run() {
381 finishOk();
382 }
383 });
384
385 }
386 }
387
388 private void finishOk() {
389 Intent data = new Intent();
390 data.putExtra("choice", getIntent().getIntExtra("choice", ConversationFragment.ATTACHMENT_CHOICE_INVALID));
391 setResult(RESULT_OK, data);
392 finish();
393 }
394
395 private void commitTrusts() {
396 for(final String fingerprint :ownKeysToTrust.keySet()) {
397 mAccount.getAxolotlService().setFingerprintTrust(
398 fingerprint,
399 FingerprintStatus.createActive(ownKeysToTrust.get(fingerprint)));
400 }
401 List<Jid> acceptedTargets = mConversation == null ? new ArrayList<Jid>() : mConversation.getAcceptedCryptoTargets();
402 synchronized (this.foreignKeysToTrust) {
403 for (Map.Entry<Jid, Map<String, Boolean>> entry : foreignKeysToTrust.entrySet()) {
404 Jid jid = entry.getKey();
405 Map<String, Boolean> value = entry.getValue();
406 if (!acceptedTargets.contains(jid)) {
407 acceptedTargets.add(jid);
408 }
409 for (final String fingerprint : value.keySet()) {
410 mAccount.getAxolotlService().setFingerprintTrust(
411 fingerprint,
412 FingerprintStatus.createActive(value.get(fingerprint)));
413 }
414 }
415 }
416 if (mConversation != null && mConversation.getMode() == Conversation.MODE_MULTI) {
417 mConversation.setAcceptedCryptoTargets(acceptedTargets);
418 xmppConnectionService.updateConversation(mConversation);
419 }
420 }
421
422 private void unlock() {
423 binding.saveButton.setEnabled(true);
424 }
425
426 private void lock() {
427 binding.saveButton.setEnabled(false);
428 }
429
430 private void lockOrUnlockAsNeeded() {
431 synchronized (this.foreignKeysToTrust) {
432 for (Jid jid : contactJids) {
433 Map<String, Boolean> fingerprints = foreignKeysToTrust.get(jid);
434 if (hasNoOtherTrustedKeys(jid) && (fingerprints == null || !fingerprints.values().contains(true))) {
435 lock();
436 return;
437 }
438 }
439 }
440 unlock();
441
442 }
443
444 private void setDone() {
445 binding.saveButton.setText(getString(R.string.done));
446 }
447
448 private void setFetching() {
449 binding.saveButton.setText(getString(R.string.fetching_keys));
450 }
451}